Scan to download
BTC $81,605.41 +2.45%
ETH $2,383.03 +1.55%
BNB $631.16 +1.04%
XRP $1.41 +1.04%
SOL $85.77 +1.47%
TRX $0.3417 +0.74%
DOGE $0.1127 +2.13%
ADA $0.2574 +2.69%
BCH $455.02 +2.84%
LINK $9.72 +2.95%
HYPE $44.08 +6.94%
AAVE $93.68 +1.36%
SUI $0.9641 +3.74%
XLM $0.1596 +1.06%
ZEC $432.32 +5.60%
BTC $81,605.41 +2.45%
ETH $2,383.03 +1.55%
BNB $631.16 +1.04%
XRP $1.41 +1.04%
SOL $85.77 +1.47%
TRX $0.3417 +0.74%
DOGE $0.1127 +2.13%
ADA $0.2574 +2.69%
BCH $455.02 +2.84%
LINK $9.72 +2.95%
HYPE $44.08 +6.94%
AAVE $93.68 +1.36%
SUI $0.9641 +3.74%
XLM $0.1596 +1.06%
ZEC $432.32 +5.60%

minds

Vitalik calls on the Ethereum community to shift their mindset, adhere to core principles, and rethink application design from scratch

Ethereum founder Vitalik stated, "I think it's a good thing for the Ethereum community to have a bolder and more open mindset, especially regarding the application layer and how we view our place in the world. We should not compromise on core attributes: censorship resistance, open source, privacy, and security (CROPS). Especially at the application layer and in the interface between Ethereum and the outside world, we should be more willing to thoroughly rethink various concepts and step out of our comfort zone.Last year, we began to prioritize privacy and give it equal importance to other types of security. This means that the Ethereum application stack will undergo fundamental changes, as the entire stack has not been built around privacy so far. Great, let's build a completely different Ethereum application stack. An example this year is rethinking the role of L2 from scratch and determining which types of L2 can truly create the greatest synergy and benefits with Ethereum. This also includes cultural factors.For me and others, this is an important part of the "milady" concept. Write down your inherent notions of "decency," crumple them up, and burn them. This mental cleansing will lead to an intellectual cleansing, thereby sparking greater creativity and broadening perspectives. For a long time, our algorithm on Ethereum has been: we have an existing ecosystem, what should we do next to make it better? Now, our algorithm should be: we have a fantastic L1 layer, and it will become even better; we have more and more tools, including those developed inside and outside the ecosystem; based on what we currently know, what is the most valuable?If you were to write the section on applications from the 2014 Ethereum white paper, starting from first principles in areas like DeFi, decentralized social, and identity verification, what would you write? At the very least, please exclude all path dependency issues, assuming the Ethereum chain is currently unused, and you are the first to propose or build the first applications, and see what you would ultimately write. Even if you are currently building existing applications, please do this. This is the secret to revitalizing Ethereum."

Slow Fog Cosine: Users need to pay attention to the permission requests of browser extensions and maintain an isolated mindset

ChainCatcher message, Slow Mist Yuxian posted on platform X stating: "An extension can be malicious, such as stealing cookies from the target page, privacy in localStorage (like account permission information, private key information), DOM tampering, request hijacking, clipboard content retrieval, etc. Relevant permission configurations can be made in manifest.json. If users are not careful about the permissions requested by the extension, it can be troublesome.However, for an extension to be malicious and directly target other extensions, such as well-known wallet extensions, it is still not easy... because of sandbox isolation... For example, it is unlikely to directly steal private key/mnemonic-related information stored in the wallet extension. If you are concerned about the permission risks of a certain extension, it is actually easy to assess this risk. After installing the extension, you can choose not to use it first, check the extension ID, search for the local path on your computer, and find the manifest.json file in the root directory of the extension. You can then directly throw the file content to AI for permission risk interpretation. If you have an isolation mindset, you might consider enabling a separate Chrome Profile for unfamiliar extensions, at least making malicious actions controllable; most extensions do not need to be enabled all the time."
app_icon
ChainCatcher Building the Web3 world with innovations.